[Resource Topic] 2020/1146: Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries

Welcome to the resource topic for 2020/1146

Title:
Let’s Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries

Authors: Siemen Dhooghe, Svetla Nikova

Abstract:

The wire probe-and-fault models are currently the most used models to provide arguments for side-channel and fault security. However, several practical attacks are not yet covered by these models. This work extends the wire fault model to include more advanced faults such as area faults and permanent faults. Moreover, we show the tile probe-and-fault adversary model from CRYPTO 2018’s CAPA envelops the extended wire fault model along with known extensions to the probing model such as glitches, transitions, and couplings. In other words, tiled (tessellated) designs offer security guarantees even against advanced probe and fault adversaries. As tiled models use multi-party computation techniques, countermeasures are typically expensive for software/hardware. This work investigates a tiled countermeasure based on the ISW methodology which is shown to perform significantly better than CAPA for practical parameters.

ePrint: https://eprint.iacr.org/2020/1146

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .